MSCR 670 Computer Forensics, Law, Evidence and Cyberterrorism

Learn how to use computer technology to identify threats and solve crimes.

Format: Offered Online and On-Campus

Duration: 8 weeks

Credits: 3 credits

The scientific discipline of computer forensics is becoming essential in recovering evidence that will be used in the pursuit of justice for all people. MSCR 670 Computer Forensics, Law, Evidence and Cyberterrorism introduces you to laws and techniques necessary to the work of a computer forensics analyst.

Throughout the course, discussions, debates, documentaries, group projects, and essay assignments will give you the opportunity to combine knowledge, principles and personal experiences to analyze and evaluate the factors associated with violence.

What You’ll Learn in MSCR 670

In this course, you’ll explore cutting-edge content on cyberterrorism, social engineering, network forensics and the process of retrieving and analyzing digital evidence. You’ll learn about the legality of searches and evidence seizure, storage, transport and analysis of electronically stored information. The technical and legal rules of procedure involved in searching, extracting, maintaining and storing electronic information will also be discussed.

Course Topics

Throughout this course, weekly topics may include but are not limited to:

  • Introduction to Computer Forensics Analysis and Electronically Stored Information (ESI)
  • Access to Electronic Evidence and Computer Evidence Search and Seizure
  • Applying Cybercrime Law and Identifying Network Criminals
  • Cyberterrorism: A Critical Analysis of Intent, Motive and Targets
  • Managing the Digital Crime Scene
  • Corporate Computer Forensics Investigations and the Prevalence of Email Forensics
  • Network and Mobile Device Forensics
  • Role of the Computer Forensics Analyst in Court

Course Learning Outcomes

Upon successful completion of MSCR 670, you will be able to:

  • Identify the techniques of acquiring digital evidence, and use those techniques to successfully analyze the data and report the findings in such a way as to be admissible in a court of law.
  • Describe the techniques that intruders use to penetrate and damage networks, and use those techniques to uncover digital evidence of criminal activity in computer networks.
  • Apply knowledge of criminal laws, court rules, legal implications and procedures, to seize, search, restore, copy, acquire, verify, analyze and store electronic data during a computer forensics investigation and examination.
  • Identify current types and theories of cybercrime and apply defensive techniques to prevent, reduce or eliminate bullying, theft, stalking, fraud, predator activity, intellectual property theft, economic espionage and hacking.
  • Process electronically stored information from operating systems, mobile devices, email and file systems in a forensically sound and ethical manner.
  • Critically evaluate and examine the motive, intent and targets of threats known as “cyberterrorism” by identifying erroneously labeled cyberterrorism incidents and identifying methods used to combat cyberterrorism lawfully.
  • Identify the current forensic tools for extracting files, file systems, deleted data and physical extractions of flash memory from mobile devices.
  • Participate in weekly live lab exercises using a Regis online virtual computer with Forensic Toolkit software to process simulated forensic evidence (case scenario included), write a basic report of findings and answer questions.

Request More Information

To learn more about the Master of Science in Criminology curriculum, including Computer Forensics, Law, Evidence and Cyberterrorism, call us at 877-820-0581 to speak with an admissions counselor. You can also request information or visit our resource center to gain more insight on the criminology and criminal justice industry.

*Disclaimer: Course content and outcomes may vary and are subject to change without notice.

Regis Criminology Industry UpdatesRequest More Information